🔐 CVE Alert

CVE-2025-3919

MEDIUM 6.4

WordPress Comments Import & Export <= 2.4.3 - Missing Authorization to Authenticated (Subscriber+) Stored Cross-Site Scripting

CVSS Score
6.4
EPSS Score
0.0%
EPSS Percentile
0th

The WordPress Comments Import & Export plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_settings function in all versions up to, and including, 2.4.3. Additionally, the plugin fails to properly sanitize and escape FTP settings parameters. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts on the plugin settings page that will execute whenever an administrative user accesses an injected page. The vulnerability was partially fixed in version 2.4.3 and fully fixed in version 2.4.4

CWE CWE-79
Vendor webtoffee
Product comments import & export
Published Jun 2, 2025
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for webtoffee comments import & export

Be the first to know when new medium vulnerabilities affecting webtoffee comments import & export are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

webtoffee / Comments Import & Export
0 ≤ 2.4.3

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/f8bc8863-04a9-4631-9510-624f98ea1e75?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/comments-import-export-woocommerce/trunk/includes/settings/class-hf_cmt_impexpcsv-settings.php?rev=3278076 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3288894/ plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3301183/

Credits

Jörg Steinsträter